Threat Assessment and Management Tools

It has been recognized that the most effective threat assessment and management practice is informed by structured professional judgment. Threat Assessment and Management professionals are therefore encouraged to use structured evaluative devices or procedures to inform their practice [see Guidelines for more information].

We have listed some tools and guidelines which have been developed for application in Threat Assessment and Management practice. AETAP are not, however, responsible for any of the tools listed on this page. There are advantages and disadvantages to most of those listed and practitioners are therefore reminded of the need to inform themselves of the reliability and validity of the tools in relation to their task in hand before utilising them. Visitors to this page are also reminded of the need to seek adequate training before using any of the tools listed.

It is fully acknowledged that the following categories are not mutually exclusive, but this is reflective of the practice of threat assessment and management; pigeonholing issues into one theme or are of concern is neither appropriate nor necessary. There will therefore be duplication of papers, tools, and/or training programs across the category pages. The categories or themes therefore merely provide an initial signposting for where members may wish to begin their search for useful and relevant information on any topic.

This page is still under development, and more information about each tool, including how and where to access them, will be available soon.

Core Principles of Threat Assessment and Management 

This section covers the key principles of threat assessment and management, and outlines the differences between this field and risk assessment. It covers the theoretical constructs that underpin TAM and offers practice advice including guidance on information gathering, (investigative) interviewing, ethical issues, fear management, etc.

Domestic Violence, including Honour-Based Violence

This section focuses on targeted violence & threatening behaviour within intimate relationships. It covers violence committed by intimate and ex-intimate partners, gender-based violence or femicide, and domestic violence (including violence perpetrated by family members, e.g., sons, mothers, etc.).

Stalking & Harassment

This section covers all aspects of stalking behaviour and harassment. There are various legal definitions of stalking and harassment across Europe, but within AETAP we broadly define this area as activity which presents as a repeated pattern of unwanted behaviour which causes distress and feels threatening to the intended target.

Threatening Communication

This section covers any method of communication which is implicitly or explicitly threatening. This includes behaviour directed towards a known, unknown or public figure, and comprises both online and IRL media.

 

Extremism / Terrorism

This section covers ideologically-driven targeted violence. As with all the other sections, it encompasses the pathways that lead to this activity, including radicalisation.

 

 

Workplace Violence & Insider Threat

This section covers concerning and unwarranted behaviour which occurs within the workplace. It includes violence targeted against senior executives, management and workforce, and encompasses insider threat.

 

Mass Homicide

This section covers targeted, explicit violence perpetrated against multiple individuals, and threats thereof.

 

 

 

The Role of Mental Disorder

Most people with a mental disorder will not exhibit threatening behaviour; however, when they do, it is essential that we understand how to respond appropriately and adopt supportive intervention practices. This section therefore comprises information about the role of mental illness, ill-health and personality disorder in targeted violence and good practice guidance.

New/Emerging Themes

This final miscellaneous category covers new areas which are emerging within the TAM field, e.g., Artificial Intelligence and Machine Learning.